Introducing OPSWAT Threat Intelligence Similarity Search Learn More

Blog Tag: malware

Code War & Defending Critical Infrastructure

March 21, 2022 by Oren T. Dvoskin
As ransomware attacks reach record-breaking highs, the lines between nation-state threat actors and other highly motivated attackers have been blurred....

How to respond to the Online Coronavirus Threat via Email?

April 01, 2020 by Janos Rotzik
According to the article of statista.com, from the 1st of January, the number of threats detected is over 300 thousand which attempts to take advantage of the...

ステガノグラフィと回避に対するデータ無害化

November 07, 2018 by Taeil Goh
私たちは、以前のブログでステガノグラフィの危険性を警告していました。ステガノグラフィとは、ファイルやメッセージ内にメッセージ、画像、ビデオ、マルウェアを隠す方法です。私たちは実際の攻撃*でステガノグラフィを目にしています。...

How to Protect Against Software Supply Chain Attacks

October 04, 2018 by Taeil Goh
What protections do you have in place to ensure that your software builds are virus-free before releasing to the public? With software supply chain attacks on...

11 of the Largest Data Breaches of All Time (Updated)

November 22, 2017 by Yiyi Miao
There were 8,069 data breaches between January 2005 and November 2017 according to the Identity Theft Resource Center, and in recent years the number of data...

FormBook Is the Latest Example of Malware-as-a-Service

October 12, 2017 by Yiyi Miao
Cyber security firm FireEye published a warning last week about the spread of FormBook malware. FormBook steals data, tracks keystrokes, and copies form...

VMRay Guest Post: Fake Microsoft Word Invoice Hides Malware

August 10, 2017
As the VMRay Research Team has written previously, cybercriminals often rely on social engineering techniques to carry out their malicious activities. In large...

For more information, please contact one of our critical infrastructure cybersecurity experts.